Lab -9 - SSL Decryption _ Forward proxy Lab (2)
Lab -9 - SSL Decryption _ Forward proxy Lab (2)
Lab Objectives
Configure the firewall to handle traffic and place it in the network
Make sure the proper Certificate Authority (CA) is on the firewall
Configure SSL decryption rules
Enable SSL decryption notification page (optional)
Commit changes and test decryption.
A Certificate Authority (CA) is required to decrypt traffic properly by generating SSL certificates on
the fly. Create a self-signed CA on the firewall or import a Subordinate CA (from your own PKI
infrastructure). Select Forward Trust Certificate and then Forward Untrust Certificate on one or
more certificates to enable the firewall to decrypt traffic.
NOTE: Because SSL certificate providers such as Entrust, Verisign, DigiCert, and GoDaddy do not sell
CAs, they are not supported in SSL Decryption.
Parameter Value
Certificate Authority Check box - Please check the box. ( Self sign purpose )
Parameter Value
Certificate Authority Check box – Please check the box ( Self sign purpose )
8. Open the certificate by clicking the name of the certificate “SSL Trust Forward
Certificate “ please check the box “ Forward Trust
Certificate “ and click Ok to close the certificate.
9. Open the certificate by clicking the name of the certificate “SSL Untrust
Forward Certificate “ please check the box “ Forward
Untrust Certificate “ and click Ok to close the
certificate.
9.2 Create Decryption Policy
The network administrator determines what needs to be decrypted. A few suggestions for
configuring SSL decryption rules:
Implement rules in a phased approach. Start with specific rules for decryption, and monitor the
typical number of SSL connections being decrypted by the device.
Avoid decrypting the following URL categories, as users may consider this an invasion of privacy:
a. Financial services
b. Health and medicine
Do not decrypt applications where the server requires client-side certificates (for identification).
Parameter Value
Parameter Value
Parameter Value
15. Click the URL Category tab and verify that is selected.
16. Click the Service tab and verify that “ Service-https “ is selected.
Parameter Value
Action Decrypt
Parameter Value
Permitted Services
4. Click OK to close the Interface Management Profile configuration window.
9.4 Validation
2. After login to PC1 with default username & password – open a browser login to
firewall webgui with help of LAN- Gateway IP “ https://192.168.x.x “
certificate .
6. Click OK to export the certificate .
7. Install the certificate in the PC Certificate store .
8. After successful installation of certificates in PC’s store please try to close all active
browser tabs.
9. After that try to access any website by checking the certificate it will be signed by
Trust-Self-CA.
Log Validation :-
Firewall which is running with pan-os greater than or equal to 9.1 have separate log for Decryption
under Monitor tab.
Check the session id – show session id <> | able to see the proxy information for decrypted traffics